Skip to main content
Home Home
  • Podcasts
  • Tech Articles
  • Top 10s
  • Content
    Topics
    • AI
    • Data
    • Emerging Technologies
    • Infrastructure Management
    • Security
    • In The News
    Media
    • Tech Articles
    • Podcasts
    • Top 10s
    • Whitepapers
    • Press Releases
    • Video Resources
  • Solution Providers
  • Industry Leaders
  • Sign In
  • Join the community
Home
Get Started
  • Access expert IT resources for free
  • Discover actionable insights from industry experts
  • Network with IT professionals and grow your network
  • Unlock exclusive analyst-led content
  • Share your thoughts with our global IT community
Coming Soon...
  • Access free expert IT resources
  • Network with professionals and industry leaders
  • Gain exclusive insights from a global IT community

Or

Sign up with LinkedIn
Sign up with Github
Sign up with Google
Signup as business
Already have account?
Privacy Policy
Contact us
Showing results for
  • Content
  • Industry experts
  • Solution providers
  • Events
No matches found
Explore by topics
Explore by type
No matches found
No matches found
Explore by topics
No matches found
Explore by topics
No result found for
Podcasts
Tech articles
Top 10s
  • AI
  • Data
  • Emerging Technologies
  • Infrastructure Management
  • Security
  • In the news
  • Press release
  • Video resources
  • Whitepapers
Industry Leaders
Media partners
Solution Providers
Events
  • About us
  • Contact us
  • FAQs
em360tech image
Guru

Richard
Stiennon

Chief Research Analyst at IT-Harvest
20 followers
0 following
Message
Follow

Work experience

IT-Harvest
Chief Research Analyst
( Nov 2017 - Present )
saf ai Inc
Advisory Board Member
( Mar 2022 - Aug 2023 )
..see more
Quick Heal
Board Member
( Sep 2021 - Present )
Anitian
Member of Board of Directors
( May 2019 - Present )
Phosphorus Cybersecurity
Member of Advisory Board
( Feb 2019 - Present )

Areas of Expertise

  • Security

About

United States
Richard Stiennon is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the 4,070+ vendors that make up the IT security industry. He has presented on the topic of cybersecurity in 32 countries on six continents. He was a lecturer at Charles Sturt University in Australia. He is the author of Surviving Cyberwar (Government Institutes, 2010) and Washington Post Best Seller, There Will Be Cyberwar. His research appears on Substack. Stiennon was Chief Strategy Officer for Blancco Technology Group, the Chief Marketing Officer for Fortinet, Inc. and VP Threat Research at Webroot Software. Prior to that he was VP Research at Gartner. He has a B.S. in Aerospace Engineering from the University of Michigan, and his MA in War in the Modern World from King’s College, London. His latest book Security Yearbook 2025 was published by Wiley in April, 2025.

...see more

Social media links

Analysts with similar expertise

Ken Buckler
em360tech image

Ken Buckler

Research Director at Enterprise Management Associates
Alejandro Leal
em360tech image

Alejandro Leal

Senior Analyst at KuppingerCole Analysts
Aparna Sundararajan
em360tech image

Aparna Sundararajan

Strategic Advisor - Secure AI at Rain Consulting Services
View more
Read How to Build a Secure Development Workflow in an Era of AI?
In this episode of The Security Strategist Podcast, Richard Stiennon, Chief Research Analyst at IT-Harvest, speaks with Jaime Jorge, the Founder and CEO of Codacy, about secure software development in the age of AI.
Security
How to Build a Secure Development Workflow in an Era of AI?
13 min
Read How Do You Stop an Encrypted DDoS Attack? How to Overcome HTTPS Challenges
In this episode of The Security Strategist Podcast, Richard Stiennon, the Chief Research Analyst at IT-Harvest, an author and a trusted cybersecurity advisor, speaks with Abergel about how Hypertext Transfer Protocol Secure (HTTPS) encryption is creating new challenges for cybersecurity professionals.
Security
How Do You Stop an Encrypted DDoS Attack? How to Overcome HTTPS Challenges
14 min
Read Is Your Workforce Ready for AI-Driven Cyber Threats?
In this episode of The Security Strategist podcast, host Richard Stiennon, Chief Research Analyst at IT-Harvest, speaks with Wohns about modern-day cybersecurity threats driven by AI. They discuss the need for a strong security culture, innovative training methods, and the importance of adapting to new attack vectors.
Security
Is Your Workforce Ready for AI-Driven Cyber Threats?
16 min
Read What is a Hardware Security Module (HSM) and Why Does it Matter for Your Cybersecurity?
em360tech podcast with futurex david close, chief solution architect on what is hardware security module (hsm) and why is it important for an enterprises' cybersecurity
Security
What is a Hardware Security Module (HSM) and Why Does it Matter for Your Cybersecurity?
17 min
Read From Prompt Injection to Agentic AI: The New Frontier of Cyber Threats
In this episode of The Security Strategist Podcast, Richard Stiennon, an industry Analyst, Author and Chief Research Analyst at IT-Harvest, speaks with Pascal Geenens, threat intelligence director of Radware how cybersecurity threats are enhanced by AI. This includes how attackers are using AI tools, the implications of new technologies like agentic AI, and the challenges posed by AI advancements.
Security
From Prompt Injection to Agentic AI: The New Frontier of Cyber Threats
23 min
Read Beyond Traditional IAM: Are You Prepared for Identity Convergence and the Rise of Agentic AI?
podcast with guidepoint about IAM: Are You Prepared for Identity Convergence and the Rise of Agentic AI?
AI
Beyond Traditional IAM: Are You Prepared for Identity Convergence and the Rise of Agentic AI?
17 min
Read Is Your Attack Surface a Swiss Cheese? Solving Attack Surface Management (ASM) Challenges
richard stiennon, cybersecurity expert podcast with craig roberts from rapid7 about enterprise security and preventative measures with better exposure management
Security
Is Your Attack Surface a Swiss Cheese? Solving Attack Surface Management (ASM) Challenges
20 min
Read Can You Afford to Ignore Exploitability?
security-strong-exposure-richard-marc
Security
Can You Afford to Ignore Exploitability?
15 min
Read Reducing Risk with Effective Exposure Management in Enterprise Tech
em360tech security strategist podcast with sevco ceo, jj guy and richard stiennon, chief research analyst at it harvest
Security
Reducing Risk with Effective Exposure Management in Enterprise Tech
16 min
Read Meeting of the Minds: State of Cybersecurity in 2025 Part II
meeting of the minds state of cybersecurity in 2025 part 2
Security
Meeting of the Minds: State of Cybersecurity in 2025 Part II
37 min
Read Meeting of the Minds: State Of Cybersecurity in 2025
EM360Tech | meeting of the minds state of cybersecurity
Security
Meeting of the Minds: State Of Cybersecurity in 2025
35 min
Read The Innovation Paradox: Security and Productivity in a Regulatory World
Hashicorp Podcast Thumbnail
Security
The Innovation Paradox: Security and Productivity in a Regulatory World
23 min
  • Load more
The Compliance Conundrum in the Cloud Era: Governance and Adapting to Regulatory Volatility
em360tech image
Whitepaper
Security

The Compliance Conundrum in the Cloud Era: Governance and Adapting to Regulatory Volatility

by Megan Leanda Berry
5 min

Automate compliance. Strengthen resilience.

Get the new EM360Tech report on cloud and hybrid compliance. Learn how to replace manual audits with continuous assurance, automate evidence collection, and govern controls with confidence in a volatile regulatory landscape.

  • Why manual compliance can’t keep up
  • How automation transforms assurance and reporting
  • Practical governance models for automated controls
  • Managing data sovereignty across jurisdictions
  • Strategies for adapting to regulatory change
Get The Report
EM360Tech Homepage em360tech.com

Access the latest analyst-led podcasts, tech articles, and industry resources as you connect with some of the brightest minds in enterprise tech.

  • x.com
  • LinkedIn
  • YouTube

Topics

  • AI
  • Data
  • Emerging Technologies
  • Infrastructure Management
  • Security

Resources

  • Articles
  • Podcasts
  • Top 10s
  • Videos
  • Whitepapers

Collaborators

  • Events
  • Experts
  • Media Partners
  • Solution Providers

Company

  • About
  • Blogs
  • FAQ
  • Our Services

Subscribe to our Newsletter

  • Contact Us
  • Our Services
  • Blogs
  • Privacy Policy
  • Editorial Policy
  • GDPR Policy
  • Sitemap

All rights reserved. ©2026

Enterprise Management 360